Homework on Public and Private Keys - Questions

  1. Public Key is a random number which is generated by your computer. This public key can then generate a public key which can be shared to the public. Think of the Private Key as the key to your house, you do not want to give people access to your house by giving them your house key. With this example you can then think of your public key as your house address, you give people your information of where you live, but they are limited to entering your house without the key “Private Key”.

  2. The 2 use cases used are Encryption and Digital Signature. In both these cases these can help in making our information more secure such as our Social Insurance numbers and other information that can be used to help thief’s steal our identity.

2 Likes
  1. Public Keys are used to provide the outputted hash function of your private key as a way of making sure that when you are sent data over the internet, only you can reverse engineer the hash to interpret the data sent to you. For example, HTTPS uses public and private keys, to provide a host the ability to securely access their servers hosted web pages.

  2. Encryption and Digital Signatures

1 Like

public key - used to encrypt sensitive info and private key decrypts the info .
2. encryption and digital signatures. digital signatures verify who sent message.

1 Like
  1. Describe the concept of public and private key with your own words.

Using this private and public key we can encrypt information and make it secure and visible only to those we choose.

  1. What 2 use-cases can public key cryptography be used for?

a) to generate Bitcoin adress
b) to identify who is the transaction coming from (signature)

1 Like
  1. Your private key is your personal key used to decrypt encrypted information given to you. Your public key is what you share with the public which someone can use to encrypt data to send to you which you can then decrypt with your private key. Your private key and public key can also act as e Signature when spending or sending bitcoin. If you lose your Private coin you will no longer have access to your bitcoin which means your bitcoin is lost. If someone has stolen your private key, they have access to your bitcoin and have basically stolen all your bitcoin.

  2. Your public Key can encrypt messages that are meant specifically for you. Also your public and private key work together and act as a Signature when sending someone crypto or verifying a transaction.

1 Like

[quote=“ivan, post:1, topic:8431, full:true”]
Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

A public key is derived from a private key. The public key can be used to encrypt a message or transaction sent to the creator or holder of the private key. Once the public key has encrypted the message or transaction, the private key can access or open the message or transaction that was encrypted using the public key. The public key cannot however be used to open items encrypted by the private key.

  1. What 2 use-cases can public key cryptography be used for?

Data encryption and Digital Signatures

1 Like
  1. private key. it’s only me who knows it. public key, i can send it to other people to send money
  2. digital signature to veryfy and the computer will encrypt it to a random numbers
2 Likes
  1. Public keys are computed from your Private key and are unidirectional meaning you cannot hash a private key from the public key. Public keys are used to encrypt messages. Private keys are used to decrypt messages. Private keys are as described and should be kept private. If someone gains access to your private keys then your data can be compromised.

  2. Encryption and digital signatures.

2 Likes
  1. In public and private key, there is a private key and a public key. The private key is a very big number, kept secret; the public key can be generated from the private one, and it’s published online for everybody to see and use.

a. Encryption; the message is encrypted with the public key, sent over an unsecure channel, then decrypted with the private key.
b. Digital signature. A hash can be computed with the private key, it’s validity can be checked with the public key, so that whoever has the private key did indeed signed the message.

1 Like

1, the concept is to generate a number by computing ( private key) using cryptography that is unique and only for you to know, from that private key you can generate a public key. The public key is for others to be able to encrypt messages sent to you or verify your transactions. private key is for you to decrypt the message or to digitally sign your transactions or receive funds (like a digital fingerprint)

Only from the private key you can go to the public key and it cannot go the other way, public key cannot be used to go back to the private key, which provides security that is impossible to break or figure out

2, there are two use cases encryption or digital signature,

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is a randomly generated alpha-numeric sequence generated by a computer, from this a public key can be generated through a hash function, but there is no way to reverse engineer a private key from a public key.
    When information is encrypted using a private key, it can be decrypted using a public key

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A public key is derived from the private key which is a number that is randomly generated by a computer. The Private key is known only to its owner and is used to sign and unencrypt information while the public key is shared with others so they may decrypt the information only you can read.
  2. What 2 use-cases can public key cryptography be used for?
    The public key can verify a signature and decrypt a file.
1 Like

Private Keys are generated with the use of a random number, public keys are derived from the private key using a special formula. Public keys can be used to encrypt data or to verify digital signatures.

What 2 use-cases can public key cryptography be used for?

Data encryption: Data can be encrypted with a public key. The only way to decrypt the data is to use the private key.

Digital Signatures: With digital signatures, the private key is used to digitally sign a transaction and the private key is used to verify the signature.

1 Like

The public key encrypts a file, the private key decrypts it. :slight_smile:

1 Like
  1. A private key, is a function used by a single entity (not shared with anyone) to open given data. A public key is a function used to lock data and the key can be shared with any one.

  2. Public key in cryptography can be used as a data encryption method or for digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is secretly held by me and safe-not shares, Public key is available to public to share, sign and verify transactions.
  2. What 2 use-cases can public key cryptography be used for? Encryption and digital signatures
2 Likes
  1. Describe the concept of public and private key with your own words: After creating a public key a private/encrypted key is generated to ensure secure, identification integrity in the transaction.Public keys are for the public, Private keys are for your eyes only.
  2. What 2 use-cases can public key cryptography be used for? Public keys can be used for encrypted and a digital signatures for verification transactions.
1 Like
  1. Describe the concept of public and private key with your own words.
    Public and private keys allow communication between 2 parties. The sender can encrypt a message with the intended recipient’s public key. The recipient can decrypt the message sent to them with their private key.

  2. What 2 use-cases can public key cryptography be used for?
    Digital signatures, encrypting messages

1 Like
  • Describe the concept of public and private key with your own words.
    Public key is generated by the Private key, Private key is just known by the user, if you have the private key of someone else you can access to their data. Public Key can be seen by anyone on the net.
  • What 2 use-cases can public key cryptography be used for?
    Sending encrypted messages.
    Digital Signatures.
1 Like

The Public Key enables everyone to join and contribute (interact with others)to the network. Anyone can read, write, and audit the ongoing activities on the public blockchain network with its Public key.

The Private Key is a large randomly regenerated number that is unique to the owner. It is encrypted, only one way, so that it remains private. It allows only selected entry through an authentic and verified invitation. The Private key controls the generation of the Public key.

Public Key use cases are: generate addresses, network with others, it keeps the private key secret, identity verification digital signatures and keeps the integrity of communication channel.

1 Like